Data Analyzer II
Inventory group: Module > Data Miners
Variations
Type | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | ![]() | |||
---|---|---|---|---|---|---|---|---|---|---|---|
Data Analyzer I | Tech I | 20 tf | 1 MW | 10s | 5,000 m | 5 % | 40 | 20 | 3 | ||
Data Analyzer II | Tech II | 25 tf | 1 MW | 10s | 6,000 m | 7 % | 60 | 30 | 3 | ||
Purloined Sansha Data Analyzer | Storyline | 8s | 10,000 m | 5 % | 80 | 40 | 3 | ||||
Ligature Integrated Analyzer | Storyline | 25 tf | 1 MW | 10s | 5,000 m | 5 % | 20 | 20 | 1 | ||
Zeugma Integrated Analyzer | Storyline | 30 tf | 1 MW | 10s | 6,000 m | 7 % | 30 | 30 | 1 | ||
Frostline 'Clavicula' Integrated Analyzer | Limited Time | 25 tf | 1 MW | 10s | 6,000 m | 6 % | 26 | 26 | 2 |
Market
Basic
- Packaged volume:
- 5 m3
- Portion size:
- 1
Tech Level:
- 2
Meta Level:
- 5
Structure Hitpoints:
- 40 HP
Capacity:
- 0 m3
Volume:
- 5 m3
Mass:
- 0 kg
radius:
- 500 m
Module
Cannot Auto Repeat:
- true
Cargo
Capacity:
- 0 m3
Fitting
CPU usage:
- 25 tf
Powergrid Usage:
- 1 MW
Activation Cost:
- 20 GJ
Weapon
Optimal Range:
- 6,000 m
Virus Coherence:
- 60
Virus Strength:
- 30
Required Skills
(x3)
[5]
(x1)
[3]
(x2)
[3]
(x1)
[2]
(x1)
[2]
Structure
Structure Hitpoints:
- 40 HP
Produced from
- Blueprint manufacturing:
- Data Analyzer II Blueprint
Engineering Rig
- Source rigs (manufacturing):
Reprocessing
- Portion size:
- 1
Output | Quantity |
---|---|
Tritanium | 840 |
Pyerite | 183 |
Mexallon | 470 |
Isogen | 4 |
Megacyte | 4 |
Transmitter | 12 |
Miniature Electronics | 9 |
Ladar Sensor Cluster | 5 |
Quantum Microprocessor | 5 |
Basic reprocessing, not accounting for skills and other bonuses.
Industry
Type Info
- Type ID:
- 30834
- Base price:
- 33.26k ISK
- Group ID:
- Data Miners
- Icon ID:
- 2856
- Market group ID:
- Analyzers
- Meta group ID:
- Tech II
- Published:
- true
- Radius:
- 500 m
- Volume:
- 5 m3
Description
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items.
Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.